Why are Predictive Data Analytics Relevant to Your Business?
BEWARE: The Software Supply Chain Attack
Hackers compromise a trusted software vendor, subvert its products with their own malicious versions, and then use the tainted formulation to infect customers.
New Cyberattack 'Ten Times' Worse Than WannaCry
Cyber terrorism is effecting businesses across all industries, globally.
Scary but true: ransomware is getting smarter
In contrast to other threats that may be based on diverse motivations and factors, ransomware targets business assets and makes itself clearly visible.
The 12 worst types of ransomware
Five years ago ransomware was a type of malware that had been kicking around for a decade to little effect. By 2017, it is everywhere, supplanting all other forms of malware as the number one menace.
Data, the Fuel of the Future
Data are to this century what oil was to the last one: a driver of growth and change. Flows of data have created new infrastructure, new businesses, new monopolies, new politics and—crucially—new economics.
100 Data and Analytics Predictions Through 2020
Over the next few years, analytics will be pervasive and mission-critical for decisions and actions across the business. This research rounds up Gartner's top 100 predictions that are relevant to CIOs, CDOs and analytics leaders, and will help them to build their future strategic plans.
Telecom 2020: Preparing for a very different future
Mega market and technological trends are creating a very new world for consumers, businesses and markets as a whole.
Big Data: A Revolution That Will Transform How We Live, Work, and Think: Viktor Mayer-Schönberger, Kenneth Cukier
Rated 4.2/5: Buy Big Data: A Revolution That Will Transform How We Live, Work, and Think by Viktor Mayer-Schönberger, Kenneth Cukier: ISBN: 9780544227750 : Amazon.com
Deloitte University Press
Minds and machines: The art of forecasting in the age of artificial intelligence
The human/artificial intelligence (AI) relationship is just heating up. Is the art of forecasting more refined when it’s done by AI or humans? What happens when you combine forces?
Video Insider: Mobile Video Growth To Skyrocket
Ready for the mobile gold rush? Of course you are. Though truth be told, the pending growth in mobile video may be more like an avalanche. Cisco's newest report predicts massive upticks in the mobile video sector in the next few years.
Secure Everything – The End of Web Caching as We Know It
Content that is encrypted cannot be cached! Hence, any HTTPS content is NON-CACHEABLE. That means all that content on Facebook, Google+, Twitter, and other social media sites that secure content is not cacheable. It means Youtube is not cacheable. The function of HTTPS is to secure the end-to-end communications between the client and the server. Web Caches get in-between the conversation – potentially breaking the session security.
Granted some web caches will still manage a HTTPS session between client and server. But, these sessions are glued together to maintain the end-to-end HTTPS integrity. None of the content is ever cached. It will diminish the customer experience by adding unnecessary latency.
The movement to secure more and more of the web space has accelerated over the last three years. The increase cyber-crime threat accreted the movement up to 2013. Then the Michel Snowden exposures promoted transformational thinking – where security is not optional anymore. Cisco measured that 10% of the 1 billion websites were encrypted. Then we had a wave of security vulnerabilities. This pushed the industry to even more encryption. The “The Matter of Heartbleed” study looked specifically at HTTPS, showing a larger increase in encryption across the Internet. In Jan 2014, Julien Vehent did a study of the Alexa’s top 1 million web sites. He found “451,470 websites have been found to have TLS enabled. Out of 1,000,000, that’s a 45% ratio.” (see https://jve.linuxwall.info/blog/index.php?post/TLS_Survey). Finally, the W3C and IETF went all in with HTTP 2.0 being default encrypted. While default encryption is controversial, forcing “default encryption” will further drive deployment. All of this impacts the effectiveness of demand based caching.